Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to use the Finger protocol.The Finger protocol is a network protocol for the exchange of user status...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the Gopher protocol.The Gopher protocol is an application layer protocol used for distributed...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access Hotspot Shield. Hotspot Shield is a VPN application developed by AnchorFree, Inc. It is used...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access Metacafe. Metacafe is a video sharing website. Its main product is short video entertainment...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the NFS protocol. Network File System (NFS) is a distributed file system protocol developed by...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the NNTP protocol.Network News Transfer Protocol (NNTP) is a protocol for distributing Usenet...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access QuickTime.QuickTime is a multimedia framework developed by Apple Inc. It can handle different...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the RDT protocol.Real Data Transport (RDT) is a proprietary transport protocol used to deliver...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access Rhapsody.Rhapsody is an online music store subscription service. It is now merged with Napster.

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access rsync.Rsync is a unix-based software application which synchronizes files and directories...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the SLP protocol.Service Location Protocol (SLP) is a protocol that allows computers and devices...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the Systat protocol.Systat or Active Users is a protocol for debugging and measurement. A connection...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the TFTP protocol.Trivial File Transport Protocol (TFTP) is a simple File Transfer Protocol that...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the WHOIS protocol.WHOIS is a query and response protocol used to query databases that store...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to make a shopping search via eBay Toolbar.eBay Toolbar is a browser toolbar that lets users access...

Dec 09, 2008 RISK: POPULARITY: